Sidechain technologies in blockchain networks: An examination and state-of-the-art review
暂无分享,去创建一个
Qi Zhang | Ali Dehghantanha | Kim-Kwang Raymond Choo | Reza M. Parizi | Amritraj Singh | Kelly Click | R. Parizi | A. Dehghantanha | Qi Zhang | Amritraj Singh | Kelly Click
[1] Jing Zeng,et al. Research on Cross-Chain Technology Based on Sidechain and Hash-Locking , 2018, EDGE.
[2] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[3] Kusprasapta Mutijarsa,et al. Block Summarization and Compression in Bitcoin Blockchain , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).
[4] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[5] Marta Piekarska,et al. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks , 2016, ArXiv.
[6] Hyuk Lim,et al. Random Mining Group Selection to Prevent 51% Attacks on Bitcoin , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).
[7] Bo Zhang,et al. A High Performance Blockchain Platform for Intelligent Devices , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[8] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[9] Yu Wei,et al. A Multiple Blockchains Architecture on Inter-Blockchain Communication , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[10] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[11] Jega Anish Dev. Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[12] Qichao Zhang,et al. A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[13] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[14] Mariia Rodinko,et al. Analysis of splitting attacks on Bitcoin and GHOST consensus protocols , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[15] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[16] R. Manoharan,et al. Security Enhancement In Bitcoin Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[17] Ali Dehghantanha,et al. Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security , 2018, ICBC.
[18] Christoph M. Friedrich,et al. Proof-of-Property - A Lightweight and Scalable Blockchain Protocol , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[19] Anamika Chauhan,et al. Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[20] Dennis Miller,et al. Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.
[21] Peter Robinson,et al. Requirements for Ethereum Private Sidechains , 2018, ArXiv.
[22] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[23] Ali Dehghantanha,et al. Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.
[24] Michael Mylrea,et al. Blockchain for Supply Chain Cybersecurity, Optimization and Compliance , 2018, 2018 Resilience Week (RWS).
[25] Ruchika Malhotra. Empirical Research in Software Engineering: Concepts, Analysis, and Applications , 2015 .
[26] Tyler Moore,et al. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.
[27] Pin Lv,et al. BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.
[28] Sidney Amani,et al. Towards verifying ethereum smart contract bytecode in Isabelle/HOL , 2018, CPP.
[29] Ali Dehghantanha,et al. On the Understanding of Gamification in Blockchain Systems , 2018, 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[30] Maurice Herlihy,et al. Atomic Cross-Chain Swaps , 2018, PODC.
[31] Xiapu Luo,et al. Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[32] Benjamin Aziz,et al. A Temporal Blockchain: A Formal Analysis , 2016, 2016 International Conference on Collaboration Technologies and Systems (CTS).
[33] Kei-Léo Brousmiche,et al. Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[34] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[35] Thomas P. Keenan,et al. Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[36] Jinan Fiaidhi,et al. EDI with Blockchain as an Enabler for Extreme Automation , 2018, IT Professional.
[37] Harry Halpin,et al. Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).